Always prioritize threat containment without losing any data, as this data could serve as an important piece of evidence for things like forensic analysis ... now implement steps to eliminate ...